Re: [Mailman-Developers] Anyone tried the DMARC mail address translucent forwarder hack?

2014-05-17 Thread Stephen J. Turnbull
John Levine writes: > You just need one DNS entry, for *.remail.lists.org. Believe it or > not, that's legal, valid, standard, etc. Legal, valid, and useful, yes. However, it's generally considered a poor practice because it means that all of those domains exist, which makes it hard to debug

Re: [Mailman-Developers] Anyone tried the DMARC mail address translucent forwarder hack?

2014-05-16 Thread John Levine
>>> that points to a server that rewrites the address and remails it, e.g. >>> mme...@yahoo.com.remail.lists.org -> mme...@yahoo.com. >I'm not very expert in this area, but it seems at least with the above, >you'd need DNS entries for yahoo.com.remail.lists.org, >aol.com.remail.lists.org, thenexto

Re: [Mailman-Developers] Anyone tried the DMARC mail address translucent forwarder hack?

2014-05-16 Thread Mark Sapiro
On 05/16/2014 08:50 AM, John Levine wrote: >> and a really evil one where you append a name >> that points to a server that rewrites the address and remails it, e.g. >> mme...@yahoo.com.remail.lists.org -> mme...@yahoo.com. > > This is apparently what LISTSERV does, give or take details of the > s

[Mailman-Developers] Anyone tried the DMARC mail address translucent forwarder hack?

2014-05-16 Thread John Levine
> and a really evil one where you append a name >that points to a server that rewrites the address and remails it, e.g. >mme...@yahoo.com.remail.lists.org -> mme...@yahoo.com. This is apparently what LISTSERV does, give or take details of the syntax of the forwarding address. Has anyone tried thi